I do not see where the confusion is. I regard field manuals and other publications to be about as useful and exciting as the ingredients label on my box of Lucky Charms (you'll never get your hands on them), but this is one definition that I think is pretty straightforward and fairly accurate.
Some people do, but that is because the use of the term "IO" by those unfamiliar with it was often equated with "talking points" in Bosnia or media relations in general or a military version of "strategic communication", and, of course, the dominance of PSYOP in the field, both in terms of personnel and the leveraging of assets, makes PSYOP and IO synonymous in the minds of many. I think if more officers actually read the definition, as the author has, then the confusion would be resolved. Then again, I know that Mr. Exum is a smart guy, so I guess we should do better.Do we use IO as shorthand for psychological operations and message management?
Not among the IO practicioners, but...Obviously, our definition of IO is different from the definition officially in use.
A definition more readily accessible to all should be framed in terms of what we are shooting for: information superiority. To that end, it is basically creating a situation in which you can quickly process accurate information about the operating environment and make accurate assessments from it, you heavily influence the degree to which the enemy can process the information quickly and make accurate decisions from it, and others (the populace in the AO) are perceiving events as you wish them to be perceived.... what do we, as counter-insurgency theorists and practitioners, mean when we use the term “information operations?” ... So who out there can propose an alternate definition, and one which we can offer to those in the field in Iraq and Afghanistan? And is “information operations” even an appropriate term for that to which we’re referring?
The first part - quickly processing information and making accurate assessments from it - is where the surveillance and reconnaissance can come in, even though they are not "core" functions of IO. It is not enough to receive the information; we must also have some confidence in how accurate it is, to include knowing when the enemy is attempting a deception and when the enemy is acting upon false information of our own. And this also explains why the definition seems heavily influence cyberstuff. The speed and ease with which we gather and process information is important and CND is a factor.
The second part - influencing the degree to which the enemy can process the information quickly - is where core functions like EW and CNO come into play, as well as physical destruction - attacking the means by which he gathers and disseminates information. OPSEC is also at play, by denying him information about your activity and objectives. And whenever OPSEC is at play, related capabilities such as counterintelligence and the sub-function of the core CNO (CND) are also in play.
The third part - the enemy not being able to make accurate decisions from it - is where deception and counterdeception come into play. The enemy does not know if he is being deceived and does not know if his own deception plans are working.
The perceptions of others are where PSYOP and PA come in (yes, I dare use those two in the same sentence) - and PSYOP can also be leveraged for many of the other functions, especially deception, which makes it very versatile and helps to explain why PSYOP personnel and resources tend to dominate the IO field.
Bookmarks